{"title":"基于不可见水印系统的评价","authors":"Daoshun Wang, Jinghong Liang, Lei Zhang, Yiqi Dai","doi":"10.1117/12.502349","DOIUrl":null,"url":null,"abstract":"In this paper we introduce steganalysis and present three detection types. By the comparison of several watermark benchmark tools, which are Stirmark, Checkmark and Optimark, we discuss the validity of watermarking system, and propose a basic condition and outline to evaluate the validity of image watermarking system.","PeriodicalId":282161,"journal":{"name":"SPIE ITCom","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Evaluation based on invisible watermarking system\",\"authors\":\"Daoshun Wang, Jinghong Liang, Lei Zhang, Yiqi Dai\",\"doi\":\"10.1117/12.502349\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we introduce steganalysis and present three detection types. By the comparison of several watermark benchmark tools, which are Stirmark, Checkmark and Optimark, we discuss the validity of watermarking system, and propose a basic condition and outline to evaluate the validity of image watermarking system.\",\"PeriodicalId\":282161,\"journal\":{\"name\":\"SPIE ITCom\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-11-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SPIE ITCom\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.502349\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SPIE ITCom","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.502349","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper we introduce steganalysis and present three detection types. By the comparison of several watermark benchmark tools, which are Stirmark, Checkmark and Optimark, we discuss the validity of watermarking system, and propose a basic condition and outline to evaluate the validity of image watermarking system.